This document discusses disadvantages and cybercrimes related to information and communication technology (ICT). It defines several types of cybercrimes such as phishing, blackmail, hacking, illegal online gambling and sales, harassment, child pornography, drug trafficking, and copyright infringement. The document also discusses ways to combat cybercrimes such as network security, investigation through IP address tracing, and penalties under relevant laws. Students are asked to share any past unwarranted ICT acts and discuss combating irresponsible use through promoting ICT's responsible use.
This document discusses disadvantages and cybercrimes related to information and communication technology (ICT). It defines several types of cybercrimes such as phishing, blackmail, hacking, illegal online gambling and sales, harassment, child pornography, drug trafficking, and copyright infringement. The document also discusses ways to combat cybercrimes such as network security, investigation through IP address tracing, and penalties under relevant laws. Students are asked to share any past unwarranted ICT acts and discuss combating irresponsible use through promoting ICT's responsible use.
This document discusses disadvantages and cybercrimes related to information and communication technology (ICT). It defines several types of cybercrimes such as phishing, blackmail, hacking, illegal online gambling and sales, harassment, child pornography, drug trafficking, and copyright infringement. The document also discusses ways to combat cybercrimes such as network security, investigation through IP address tracing, and penalties under relevant laws. Students are asked to share any past unwarranted ICT acts and discuss combating irresponsible use through promoting ICT's responsible use.
This document discusses disadvantages and cybercrimes related to information and communication technology (ICT). It defines several types of cybercrimes such as phishing, blackmail, hacking, illegal online gambling and sales, harassment, child pornography, drug trafficking, and copyright infringement. The document also discusses ways to combat cybercrimes such as network security, investigation through IP address tracing, and penalties under relevant laws. Students are asked to share any past unwarranted ICT acts and discuss combating irresponsible use through promoting ICT's responsible use.
the bad things or any unwarranted acts (like piracy) you have done using ICT.
Why you did them?
Cybercrimes - are illegal acts done through the use of Internet. Cybercrimes 1. Phishing/Spoofing - the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. Cybercrimes 2. Blackmail/Extortion - the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value Cybercrimes 3. Accessing Stored Communications - hacking; the act of obtaining unauthorized access to data from a computer network. Cybercrimes 4. Sports Betting - the act of wagering on any sports event over the Internet. Cybercrimes 5. Non-delivery of Merchandise - the act of devising a scheme wherein a culprit posts an item or service on sale on the Internet and once transaction has been done, does not really give the item/service Cybercrimes 6. Electronic Harassment - the act of anonymously using the Internet to harass, abuse, threaten or annoy other people. - an act of cyberbullying Cybercrimes 7. Child Pornography - an act of using the Internet to show child pornography. - this act is highly punishable by law. Cybercrimes 8. Prostitution - the act of using the Internet to engage prostitution Cybercrimes 9. Drug Trafficking - the act of selling illegal substance using the Internet Cybercrimes 10. Criminal Copyright Infringement - the act of piracy mainly for financial gain. Combatting Cybercrimes 1. Network Security – before a hacker can get through unauthorized files, the hacker has to get through security measures like firewalls, secure connections, password, anti-malwares, and data encryption. Combatting Cybercrimes 2. Investigation – URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. Combatting Cybercrimes 3. Penalties - More and more laws are being created and implemented today. - Penalties include both a fine and imprisonment. BLOG ACTIVITY - Make a video blog post about everything you have learned in ICT and its possible impact to our society - Talk about its positive and negative impacts and the youth’s role in helping promote its responsible use. - You can have an interview, debate, reenactment